CybercentreCanada / assemblyline

AssemblyLine 4: File triage and malware analysis
https://cybercentrecanada.github.io/assemblyline4_docs/
MIT License
235 stars 14 forks source link

Config to lower level of heuristics EXTRACT.28 and EXTRACT.13 #245

Open kam193 opened 1 month ago

kam193 commented 1 month ago

Is your feature request related to a problem? Please describe. When analysing Python packages, I often came across false positives from those two heuristics:

Apparently, it's not an uncommon situation for Python packages compiled for Windows to have executable parts in _RDATA, I also came across multiple DLLs triggering this heuristic (e.g. fe27c4c07c0cfbb2ee28c8409e5a8db89d86c6c2d76c6e3b79ab31979138b215).

The second isn't uncommon as well, and in addition - looks like it has some issues with properly handling binary files from which an executable was extracted. I've noticed it's sometimes triggered when an exe is extracted from another exe, or when it manages to decompile code from a PYC file (but not always):

obraz

(__decompiled_source.py comes from my service, Extractor didn't see it)

Describe the solution you'd like

Describe alternatives you've considered

Additional context Extract service already has multiple options for adjusting some heuristics, but not those.